Browsing Conference Papers by Title
Now showing items 14-18 of 18
Measuring Player's Perceptions of Mobile Games from Gameplay Data -- A Case Study from Mobile Game Offerings from Playlab (2016-01)
In measuring player’s perception of computer games, there are many approaches that could be utilized. The usage of questionnaires, player observation, abstract models, and other approaches have been utilized over the years in this problem domain. Though the traditional approaches have been used quite effectively, there is room for improvement. Due to better Internet infrastructure, many players are online which allows game developers to develop games that can collect gameplay data. With this gameplay data, it is possible to analyze the gameplay ...
This paper examines whether there is a relation between over-investment and free cash flow. In perfect capital market, it is expected that investment decision should not be influenced by the level of cash flow. However, the free cash flow hypothesis predicts that firms with higher free cash flow will be vulnerable to the agency problem like over-investment. Using the data from listed firms in the Stock Exchange of Thailand during 2001-2013, the result indicates that there is a positive relation between over-investment and free cash flow. ...
The main objective of this research is to explore the possibility of applying the Sufficiency Economy Philosophy in purchasing of the organizations. The Sufficiency Economy Philosophy is initiated by His Majesty the King Bhumibol Adulyadej of Thailand. The philosophy reflecting the principle of Thai culture is a method of development on the three foundations of moderation, reasonableness, and self-immunity. These three bases are performed with the provision of knowledge and integrity as well as the intelligence and perseverance leading to the ...
This study discusses major security issues and concerns related to cloud computing environment in regard to knowledge management system processes such as knowledge creation, refining, storing, sharing, and utilization. This study uses the exploratory approach to address major security concerns and whether they need consideration for each knowledge management process. The result of this study reveals main cloud computing security concerns such as data security and confidentiality issues, access controls, data loss or leakage prevention, ...